Phishing scams—the use of fake E-mails to dupe people into yielding up their account numbers and passwords—is on the rise. Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince recipients to respond. Technical subterfuge schemes plant crimeware onto PCs to steal...
Nearly a quarter of PC users are targeted by monthly phishing attempts, according to a national study of online security.
Phishing is, of course, the practice of sending bogus but authentic-looking e-mails, purportedly from a trusted organization, to consumers in hopes of tricking them into revealing personal...
"Botnet" Investigation Led by U.S. Secret Service’s Electronic Crimes Task Force and the Computer
Hacking and Intellectual Property Unit of the U.S. Attorney’s Office
SAN JOSE – United States Attorney Kevin V. Ryan announced that Anthony Scott Clark, 21, of Beaverton, Oregon, pleaded guilty...
The United States Attorney for the Northern District of California announced that Suibin Zhang, 37, of San Jose, California, was charged late yesterday by a federal grand jury in San Jose in a nine-count indictment alleging computer fraud; theft and unauthorized downloading of trade secrets; and the unauthorized...
Caused As Much As $20 Million in Losses to Software Industry
WASHINGTON, D.C.—The owner of one of the largest for-profit software piracy websites to operate in the United States has pleaded guilty to operating a software piracy website, Assistant Attorney General Alice S. Fisher for the Justice Department's...
Internet-related crime,
like any other crime, should be reported to appropriate law enforcement investigative
authorities at the local, state, federal, or international levels, depending
on the scope of the crime. Citizens who are aware of federal crimes
should report them to local offices...
How likely are you to be wooed into a false sense of security by a friendly face or the promise of a cash prize?A friendly, wholesome-looking team of surveyors recently set up shop in New York’s Central Park on behalf of RSA Security to find out how much personal information consumers would give up while...
In our ten years’ experience in detecting, locating, and prosecuting network intruders (hackers) we have seen that, as with many offline crimes, robust law enforcement alone cannot solve the network intruder problem. To be effective, any overall strategy must include the owners and operators of the...
Since January 1, at least 104 data incidents have been documented in the U.S., potentially affecting more than 56.2 million individuals. And that is probably just the tip of the iceberg.How many breaches don’t make the front page because the victimized company wants to avoid embarrassing publicity? We will...
Most Internet users know spam when they see it, but the vast majority are unfamiliar with terms like “podcasting,†“phishing,†and “RSS,†according to a recent study.The Pew Internet and American Life Project research, based on random telephone interviews with 1,336 Internet users,...
Hackers have changed their tactics and are exploiting flaws in popular software applications – including security programs — to break into the computers of consumers, government agencies, and businesses. What’s new about this, you might ask? The key word is “applications.” ...
High-tech criminal gangs with access to sophisticated keylogging viruses pose a growing threat to banks and financial institutions.Recently, England’s High Tech Crime Unit foiled an effort to steal over $100 million from a Japanese bank in London. The gang gained access to Sumitomo Corp.’s computer...
We all know the threats posed by spyware to enterprise networks: user ID and password theft, financial loss, productivity drain, intellectual property theft. Security practitioners have two defenses at their disposal: the human and the technical. While the technology for combating spyware is improving, antivirus...
A. RISK DISCUSSIONIntroductionA significant number of financial institutions1 regulated by the financial institution regulatory agencies (Agencies)2 maintain sites on the World Wide Web. Many of these websites contain weblinks to other sites not under direct control of the financial institution. The use of weblinks...
National Security InstitutePopular E-Greeting Card Carries TrojanAn e-mail message that claims to hold a link to a greeting card is responsible for a recent series of “Trojan horse†cyber-attacks. The e-mail directs recipients to click on a link in order to pick up an e-card from a “secret...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.